pulumi-snowflake 0.50.3a1710160126__py3-none-any.whl → 1.2.0a1736849992__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +224 -172
- pulumi_snowflake/_inputs.py +52857 -1665
- pulumi_snowflake/_utilities.py +41 -5
- pulumi_snowflake/account.py +188 -218
- pulumi_snowflake/account_authentication_policy_attachment.py +149 -0
- pulumi_snowflake/account_parameter.py +21 -48
- pulumi_snowflake/account_password_policy_attachment.py +7 -32
- pulumi_snowflake/account_role.py +250 -0
- pulumi_snowflake/alert.py +38 -47
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +704 -0
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +657 -0
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +692 -0
- pulumi_snowflake/api_integration.py +33 -52
- pulumi_snowflake/authentication_policy.py +622 -0
- pulumi_snowflake/config/__init__.pyi +76 -99
- pulumi_snowflake/config/outputs.py +5 -0
- pulumi_snowflake/config/vars.py +93 -124
- pulumi_snowflake/cortex_search_service.py +596 -0
- pulumi_snowflake/database.py +819 -213
- pulumi_snowflake/database_role.py +81 -44
- pulumi_snowflake/dynamic_table.py +42 -49
- pulumi_snowflake/email_notification_integration.py +33 -28
- pulumi_snowflake/{unsafe_execute.py → execute.py} +36 -39
- pulumi_snowflake/external_function.py +54 -75
- pulumi_snowflake/external_oauth_integration.py +593 -542
- pulumi_snowflake/external_table.py +67 -90
- pulumi_snowflake/external_volume.py +382 -0
- pulumi_snowflake/failover_group.py +57 -98
- pulumi_snowflake/file_format.py +33 -28
- pulumi_snowflake/function_java.py +1211 -0
- pulumi_snowflake/function_javascript.py +882 -0
- pulumi_snowflake/function_python.py +1212 -0
- pulumi_snowflake/function_scala.py +1212 -0
- pulumi_snowflake/function_sql.py +835 -0
- pulumi_snowflake/get_account_roles.py +129 -0
- pulumi_snowflake/get_accounts.py +53 -22
- pulumi_snowflake/get_alerts.py +22 -9
- pulumi_snowflake/get_connections.py +109 -0
- pulumi_snowflake/get_cortex_search_services.py +216 -0
- pulumi_snowflake/get_current_account.py +24 -13
- pulumi_snowflake/get_current_role.py +14 -7
- pulumi_snowflake/get_database.py +25 -9
- pulumi_snowflake/get_database_role.py +162 -0
- pulumi_snowflake/get_database_roles.py +79 -47
- pulumi_snowflake/get_databases.py +91 -73
- pulumi_snowflake/get_dynamic_tables.py +36 -19
- pulumi_snowflake/get_external_functions.py +28 -9
- pulumi_snowflake/get_external_tables.py +28 -9
- pulumi_snowflake/get_failover_groups.py +18 -7
- pulumi_snowflake/get_file_formats.py +28 -9
- pulumi_snowflake/get_functions.py +28 -9
- pulumi_snowflake/get_grants.py +207 -84
- pulumi_snowflake/get_masking_policies.py +91 -51
- pulumi_snowflake/get_materialized_views.py +28 -9
- pulumi_snowflake/get_network_policies.py +129 -0
- pulumi_snowflake/get_parameters.py +38 -15
- pulumi_snowflake/get_pipes.py +28 -9
- pulumi_snowflake/get_procedures.py +28 -9
- pulumi_snowflake/get_resource_monitors.py +37 -24
- pulumi_snowflake/get_row_access_policies.py +91 -51
- pulumi_snowflake/get_schemas.py +145 -41
- pulumi_snowflake/get_secrets.py +200 -0
- pulumi_snowflake/get_security_integrations.py +129 -0
- pulumi_snowflake/get_sequences.py +28 -9
- pulumi_snowflake/get_shares.py +18 -9
- pulumi_snowflake/get_stages.py +28 -9
- pulumi_snowflake/get_storage_integrations.py +16 -9
- pulumi_snowflake/get_streamlits.py +170 -0
- pulumi_snowflake/get_streams.py +114 -54
- pulumi_snowflake/get_system_generate_scim_access_token.py +18 -9
- pulumi_snowflake/get_system_get_aws_sns_iam_policy.py +32 -7
- pulumi_snowflake/get_system_get_private_link_config.py +120 -5
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +15 -7
- pulumi_snowflake/get_tables.py +28 -9
- pulumi_snowflake/get_tags.py +130 -0
- pulumi_snowflake/get_tasks.py +134 -54
- pulumi_snowflake/get_users.py +116 -44
- pulumi_snowflake/get_views.py +114 -54
- pulumi_snowflake/get_warehouses.py +79 -26
- pulumi_snowflake/grant_account_role.py +28 -75
- pulumi_snowflake/grant_application_role.py +257 -0
- pulumi_snowflake/grant_database_role.py +35 -94
- pulumi_snowflake/grant_ownership.py +382 -0
- pulumi_snowflake/grant_privileges_to_account_role.py +42 -78
- pulumi_snowflake/grant_privileges_to_database_role.py +37 -383
- pulumi_snowflake/grant_privileges_to_share.py +96 -44
- pulumi_snowflake/legacy_service_user.py +3670 -0
- pulumi_snowflake/managed_account.py +40 -11
- pulumi_snowflake/masking_policy.py +213 -310
- pulumi_snowflake/materialized_view.py +62 -71
- pulumi_snowflake/network_policy.py +217 -61
- pulumi_snowflake/network_policy_attachment.py +5 -34
- pulumi_snowflake/network_rule.py +473 -0
- pulumi_snowflake/notification_integration.py +49 -84
- pulumi_snowflake/oauth_integration_for_custom_clients.py +906 -0
- pulumi_snowflake/{oauth_integration.py → oauth_integration_for_partner_applications.py} +191 -192
- pulumi_snowflake/object_parameter.py +10 -101
- pulumi_snowflake/outputs.py +49200 -2928
- pulumi_snowflake/password_policy.py +41 -28
- pulumi_snowflake/pipe.py +33 -4
- pulumi_snowflake/primary_connection.py +330 -0
- pulumi_snowflake/procedure_java.py +1273 -0
- pulumi_snowflake/procedure_javascript.py +895 -0
- pulumi_snowflake/procedure_python.py +1226 -0
- pulumi_snowflake/procedure_scala.py +1273 -0
- pulumi_snowflake/procedure_sql.py +895 -0
- pulumi_snowflake/provider.py +378 -613
- pulumi_snowflake/pulumi-plugin.json +2 -1
- pulumi_snowflake/resource_monitor.py +118 -327
- pulumi_snowflake/row_access_policy.py +200 -149
- pulumi_snowflake/{saml_integration.py → saml2_integration.py} +356 -299
- pulumi_snowflake/schema.py +949 -178
- pulumi_snowflake/scim_integration.py +286 -109
- pulumi_snowflake/secondary_connection.py +339 -0
- pulumi_snowflake/secondary_database.py +1080 -0
- pulumi_snowflake/secret_with_authorization_code_grant.py +548 -0
- pulumi_snowflake/secret_with_basic_authentication.py +500 -0
- pulumi_snowflake/secret_with_client_credentials.py +511 -0
- pulumi_snowflake/secret_with_generic_string.py +452 -0
- pulumi_snowflake/sequence.py +9 -34
- pulumi_snowflake/service_user.py +3585 -0
- pulumi_snowflake/share.py +33 -28
- pulumi_snowflake/shared_database.py +939 -0
- pulumi_snowflake/stage.py +95 -84
- pulumi_snowflake/storage_integration.py +46 -4
- pulumi_snowflake/stream_on_directory_table.py +517 -0
- pulumi_snowflake/stream_on_external_table.py +632 -0
- pulumi_snowflake/stream_on_table.py +666 -0
- pulumi_snowflake/stream_on_view.py +666 -0
- pulumi_snowflake/streamlit.py +671 -0
- pulumi_snowflake/table.py +86 -97
- pulumi_snowflake/table_column_masking_policy_application.py +7 -14
- pulumi_snowflake/table_constraint.py +29 -172
- pulumi_snowflake/tag.py +142 -74
- pulumi_snowflake/tag_association.py +40 -215
- pulumi_snowflake/task.py +3048 -418
- pulumi_snowflake/user.py +3351 -384
- pulumi_snowflake/user_authentication_policy_attachment.py +197 -0
- pulumi_snowflake/user_password_policy_attachment.py +5 -4
- pulumi_snowflake/user_public_keys.py +5 -0
- pulumi_snowflake/view.py +466 -215
- pulumi_snowflake/warehouse.py +184 -168
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/METADATA +7 -6
- pulumi_snowflake-1.2.0a1736849992.dist-info/RECORD +148 -0
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/WHEEL +1 -1
- pulumi_snowflake/account_grant.py +0 -343
- pulumi_snowflake/database_grant.py +0 -495
- pulumi_snowflake/external_table_grant.py +0 -690
- pulumi_snowflake/failover_group_grant.py +0 -388
- pulumi_snowflake/file_format_grant.py +0 -635
- pulumi_snowflake/function.py +0 -872
- pulumi_snowflake/function_grant.py +0 -745
- pulumi_snowflake/get_role.py +0 -121
- pulumi_snowflake/get_roles.py +0 -120
- pulumi_snowflake/grant_privileges_to_role.py +0 -825
- pulumi_snowflake/integration_grant.py +0 -440
- pulumi_snowflake/masking_policy_grant.py +0 -542
- pulumi_snowflake/materialized_view_grant.py +0 -689
- pulumi_snowflake/pipe_grant.py +0 -587
- pulumi_snowflake/procedure.py +0 -887
- pulumi_snowflake/procedure_grant.py +0 -745
- pulumi_snowflake/resource_monitor_grant.py +0 -387
- pulumi_snowflake/role.py +0 -273
- pulumi_snowflake/role_grants.py +0 -352
- pulumi_snowflake/role_ownership_grant.py +0 -338
- pulumi_snowflake/row_access_policy_grant.py +0 -540
- pulumi_snowflake/schema_grant.py +0 -647
- pulumi_snowflake/sequence_grant.py +0 -635
- pulumi_snowflake/session_parameter.py +0 -332
- pulumi_snowflake/stage_grant.py +0 -635
- pulumi_snowflake/stream.py +0 -614
- pulumi_snowflake/stream_grant.py +0 -635
- pulumi_snowflake/table_grant.py +0 -677
- pulumi_snowflake/tag_grant.py +0 -532
- pulumi_snowflake/tag_masking_policy_association.py +0 -210
- pulumi_snowflake/task_grant.py +0 -635
- pulumi_snowflake/user_grant.py +0 -394
- pulumi_snowflake/user_ownership_grant.py +0 -286
- pulumi_snowflake/view_grant.py +0 -705
- pulumi_snowflake/warehouse_grant.py +0 -440
- pulumi_snowflake-0.50.3a1710160126.dist-info/RECORD +0 -136
- {pulumi_snowflake-0.50.3a1710160126.dist-info → pulumi_snowflake-1.2.0a1736849992.dist-info}/top_level.txt +0 -0
|
@@ -4,9 +4,14 @@
|
|
|
4
4
|
|
|
5
5
|
import copy
|
|
6
6
|
import warnings
|
|
7
|
+
import sys
|
|
7
8
|
import pulumi
|
|
8
9
|
import pulumi.runtime
|
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
10
15
|
from . import _utilities
|
|
11
16
|
from . import outputs
|
|
12
17
|
from ._inputs import *
|
|
@@ -28,19 +33,14 @@ class GrantPrivilegesToAccountRoleArgs:
|
|
|
28
33
|
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
29
34
|
"""
|
|
30
35
|
The set of arguments for constructing a GrantPrivilegesToAccountRole resource.
|
|
31
|
-
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
|
|
36
|
+
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
32
37
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
|
|
33
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
34
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
35
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
36
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
37
|
-
of the config being eventually convergent (producing an empty plan).
|
|
38
38
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
39
39
|
:param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
|
|
40
40
|
:param pulumi.Input['GrantPrivilegesToAccountRoleOnAccountObjectArgs'] on_account_object: Specifies the account object on which privileges will be granted
|
|
41
41
|
:param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
|
|
42
42
|
:param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
|
|
43
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
44
44
|
:param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
|
|
45
45
|
"""
|
|
46
46
|
pulumi.set(__self__, "account_role_name", account_role_name)
|
|
@@ -67,7 +67,7 @@ class GrantPrivilegesToAccountRoleArgs:
|
|
|
67
67
|
@pulumi.getter(name="accountRoleName")
|
|
68
68
|
def account_role_name(self) -> pulumi.Input[str]:
|
|
69
69
|
"""
|
|
70
|
-
The fully qualified name of the account role to which privileges will be granted.
|
|
70
|
+
The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
71
71
|
"""
|
|
72
72
|
return pulumi.get(self, "account_role_name")
|
|
73
73
|
|
|
@@ -90,13 +90,6 @@ class GrantPrivilegesToAccountRoleArgs:
|
|
|
90
90
|
@property
|
|
91
91
|
@pulumi.getter(name="alwaysApply")
|
|
92
92
|
def always_apply(self) -> Optional[pulumi.Input[bool]]:
|
|
93
|
-
"""
|
|
94
|
-
If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
95
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
96
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
97
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
98
|
-
of the config being eventually convergent (producing an empty plan).
|
|
99
|
-
"""
|
|
100
93
|
return pulumi.get(self, "always_apply")
|
|
101
94
|
|
|
102
95
|
@always_apply.setter
|
|
@@ -167,7 +160,7 @@ class GrantPrivilegesToAccountRoleArgs:
|
|
|
167
160
|
@pulumi.getter
|
|
168
161
|
def privileges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
169
162
|
"""
|
|
170
|
-
The privileges to grant on the account role.
|
|
163
|
+
The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
171
164
|
"""
|
|
172
165
|
return pulumi.get(self, "privileges")
|
|
173
166
|
|
|
@@ -203,19 +196,14 @@ class _GrantPrivilegesToAccountRoleState:
|
|
|
203
196
|
with_grant_option: Optional[pulumi.Input[bool]] = None):
|
|
204
197
|
"""
|
|
205
198
|
Input properties used for looking up and filtering GrantPrivilegesToAccountRole resources.
|
|
206
|
-
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
|
|
199
|
+
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
207
200
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
|
|
208
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
209
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
210
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
211
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
212
|
-
of the config being eventually convergent (producing an empty plan).
|
|
213
201
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
214
202
|
:param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
|
|
215
203
|
:param pulumi.Input['GrantPrivilegesToAccountRoleOnAccountObjectArgs'] on_account_object: Specifies the account object on which privileges will be granted
|
|
216
204
|
:param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaArgs'] on_schema: Specifies the schema on which privileges will be granted.
|
|
217
205
|
:param pulumi.Input['GrantPrivilegesToAccountRoleOnSchemaObjectArgs'] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
218
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
|
|
206
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
219
207
|
:param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
|
|
220
208
|
"""
|
|
221
209
|
if account_role_name is not None:
|
|
@@ -243,7 +231,7 @@ class _GrantPrivilegesToAccountRoleState:
|
|
|
243
231
|
@pulumi.getter(name="accountRoleName")
|
|
244
232
|
def account_role_name(self) -> Optional[pulumi.Input[str]]:
|
|
245
233
|
"""
|
|
246
|
-
The fully qualified name of the account role to which privileges will be granted.
|
|
234
|
+
The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
247
235
|
"""
|
|
248
236
|
return pulumi.get(self, "account_role_name")
|
|
249
237
|
|
|
@@ -266,13 +254,6 @@ class _GrantPrivilegesToAccountRoleState:
|
|
|
266
254
|
@property
|
|
267
255
|
@pulumi.getter(name="alwaysApply")
|
|
268
256
|
def always_apply(self) -> Optional[pulumi.Input[bool]]:
|
|
269
|
-
"""
|
|
270
|
-
If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
271
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
272
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
273
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
274
|
-
of the config being eventually convergent (producing an empty plan).
|
|
275
|
-
"""
|
|
276
257
|
return pulumi.get(self, "always_apply")
|
|
277
258
|
|
|
278
259
|
@always_apply.setter
|
|
@@ -343,7 +324,7 @@ class _GrantPrivilegesToAccountRoleState:
|
|
|
343
324
|
@pulumi.getter
|
|
344
325
|
def privileges(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
345
326
|
"""
|
|
346
|
-
The privileges to grant on the account role.
|
|
327
|
+
The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
347
328
|
"""
|
|
348
329
|
return pulumi.get(self, "privileges")
|
|
349
330
|
|
|
@@ -374,9 +355,9 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
374
355
|
always_apply: Optional[pulumi.Input[bool]] = None,
|
|
375
356
|
always_apply_trigger: Optional[pulumi.Input[str]] = None,
|
|
376
357
|
on_account: Optional[pulumi.Input[bool]] = None,
|
|
377
|
-
on_account_object: Optional[pulumi.Input[
|
|
378
|
-
on_schema: Optional[pulumi.Input[
|
|
379
|
-
on_schema_object: Optional[pulumi.Input[
|
|
358
|
+
on_account_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']]] = None,
|
|
359
|
+
on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']]] = None,
|
|
360
|
+
on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']]] = None,
|
|
380
361
|
privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
381
362
|
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
382
363
|
__props__=None):
|
|
@@ -388,42 +369,37 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
388
369
|
#### Grant all privileges OnAccountObject (Database)
|
|
389
370
|
|
|
390
371
|
```sh
|
|
391
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
372
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|ALL|OnAccountObject|DATABASE|"test_db"'`
|
|
392
373
|
```
|
|
393
374
|
|
|
394
375
|
#### Grant list of privileges OnAllSchemasInDatabase
|
|
395
376
|
|
|
396
377
|
```sh
|
|
397
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
378
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
|
|
398
379
|
```
|
|
399
380
|
|
|
400
381
|
#### Grant list of privileges on table
|
|
401
382
|
|
|
402
383
|
```sh
|
|
403
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
384
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
|
|
404
385
|
```
|
|
405
386
|
|
|
406
387
|
#### Grant list of privileges OnAll tables in schema
|
|
407
388
|
|
|
408
389
|
```sh
|
|
409
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
390
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
|
|
410
391
|
```
|
|
411
392
|
|
|
412
393
|
:param str resource_name: The name of the resource.
|
|
413
394
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
414
|
-
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
|
|
395
|
+
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
415
396
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
|
|
416
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
417
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
418
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
419
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
420
|
-
of the config being eventually convergent (producing an empty plan).
|
|
421
397
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
422
398
|
:param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
|
|
423
|
-
:param pulumi.Input[
|
|
424
|
-
:param pulumi.Input[
|
|
425
|
-
:param pulumi.Input[
|
|
426
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
|
|
399
|
+
:param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']] on_account_object: Specifies the account object on which privileges will be granted
|
|
400
|
+
:param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
|
|
401
|
+
:param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
402
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
427
403
|
:param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
|
|
428
404
|
"""
|
|
429
405
|
...
|
|
@@ -440,25 +416,25 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
440
416
|
#### Grant all privileges OnAccountObject (Database)
|
|
441
417
|
|
|
442
418
|
```sh
|
|
443
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
419
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|ALL|OnAccountObject|DATABASE|"test_db"'`
|
|
444
420
|
```
|
|
445
421
|
|
|
446
422
|
#### Grant list of privileges OnAllSchemasInDatabase
|
|
447
423
|
|
|
448
424
|
```sh
|
|
449
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
425
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|CREATE TAG,CREATE TABLE|OnSchema|OnAllSchemasInDatabase|"test_db"'`
|
|
450
426
|
```
|
|
451
427
|
|
|
452
428
|
#### Grant list of privileges on table
|
|
453
429
|
|
|
454
430
|
```sh
|
|
455
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
431
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnObject|TABLE|"test_db"."test_schema"."test_table"'`
|
|
456
432
|
```
|
|
457
433
|
|
|
458
434
|
#### Grant list of privileges OnAll tables in schema
|
|
459
435
|
|
|
460
436
|
```sh
|
|
461
|
-
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole
|
|
437
|
+
$ pulumi import snowflake:index/grantPrivilegesToAccountRole:GrantPrivilegesToAccountRole example '"test_db_role"|false|false|SELECT,DELETE,INSERT|OnSchemaObject|OnAll|TABLES|InSchema|"test_db"."test_schema"'`
|
|
462
438
|
```
|
|
463
439
|
|
|
464
440
|
:param str resource_name: The name of the resource.
|
|
@@ -481,9 +457,9 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
481
457
|
always_apply: Optional[pulumi.Input[bool]] = None,
|
|
482
458
|
always_apply_trigger: Optional[pulumi.Input[str]] = None,
|
|
483
459
|
on_account: Optional[pulumi.Input[bool]] = None,
|
|
484
|
-
on_account_object: Optional[pulumi.Input[
|
|
485
|
-
on_schema: Optional[pulumi.Input[
|
|
486
|
-
on_schema_object: Optional[pulumi.Input[
|
|
460
|
+
on_account_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']]] = None,
|
|
461
|
+
on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']]] = None,
|
|
462
|
+
on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']]] = None,
|
|
487
463
|
privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
488
464
|
with_grant_option: Optional[pulumi.Input[bool]] = None,
|
|
489
465
|
__props__=None):
|
|
@@ -522,9 +498,9 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
522
498
|
always_apply: Optional[pulumi.Input[bool]] = None,
|
|
523
499
|
always_apply_trigger: Optional[pulumi.Input[str]] = None,
|
|
524
500
|
on_account: Optional[pulumi.Input[bool]] = None,
|
|
525
|
-
on_account_object: Optional[pulumi.Input[
|
|
526
|
-
on_schema: Optional[pulumi.Input[
|
|
527
|
-
on_schema_object: Optional[pulumi.Input[
|
|
501
|
+
on_account_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']]] = None,
|
|
502
|
+
on_schema: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']]] = None,
|
|
503
|
+
on_schema_object: Optional[pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']]] = None,
|
|
528
504
|
privileges: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
529
505
|
with_grant_option: Optional[pulumi.Input[bool]] = None) -> 'GrantPrivilegesToAccountRole':
|
|
530
506
|
"""
|
|
@@ -534,19 +510,14 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
534
510
|
:param str resource_name: The unique name of the resulting resource.
|
|
535
511
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
536
512
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
537
|
-
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted.
|
|
513
|
+
:param pulumi.Input[str] account_role_name: The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
538
514
|
:param pulumi.Input[bool] all_privileges: Grant all privileges on the account role.
|
|
539
|
-
:param pulumi.Input[bool] always_apply: If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
540
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
541
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
542
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
543
|
-
of the config being eventually convergent (producing an empty plan).
|
|
544
515
|
:param pulumi.Input[str] always_apply_trigger: This is a helper field and should not be set. Its main purpose is to help to achieve the functionality described by the always_apply field.
|
|
545
516
|
:param pulumi.Input[bool] on_account: If true, the privileges will be granted on the account.
|
|
546
|
-
:param pulumi.Input[
|
|
547
|
-
:param pulumi.Input[
|
|
548
|
-
:param pulumi.Input[
|
|
549
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role.
|
|
517
|
+
:param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnAccountObjectArgs', 'GrantPrivilegesToAccountRoleOnAccountObjectArgsDict']] on_account_object: Specifies the account object on which privileges will be granted
|
|
518
|
+
:param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaArgs', 'GrantPrivilegesToAccountRoleOnSchemaArgsDict']] on_schema: Specifies the schema on which privileges will be granted.
|
|
519
|
+
:param pulumi.Input[Union['GrantPrivilegesToAccountRoleOnSchemaObjectArgs', 'GrantPrivilegesToAccountRoleOnSchemaObjectArgsDict']] on_schema_object: Specifies the schema object on which privileges will be granted.
|
|
520
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] privileges: The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
550
521
|
:param pulumi.Input[bool] with_grant_option: Specifies whether the grantee can grant the privileges to other users.
|
|
551
522
|
"""
|
|
552
523
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
@@ -569,7 +540,7 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
569
540
|
@pulumi.getter(name="accountRoleName")
|
|
570
541
|
def account_role_name(self) -> pulumi.Output[str]:
|
|
571
542
|
"""
|
|
572
|
-
The fully qualified name of the account role to which privileges will be granted.
|
|
543
|
+
The fully qualified name of the account role to which privileges will be granted. For more information about this resource, see docs.
|
|
573
544
|
"""
|
|
574
545
|
return pulumi.get(self, "account_role_name")
|
|
575
546
|
|
|
@@ -584,13 +555,6 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
584
555
|
@property
|
|
585
556
|
@pulumi.getter(name="alwaysApply")
|
|
586
557
|
def always_apply(self) -> pulumi.Output[Optional[bool]]:
|
|
587
|
-
"""
|
|
588
|
-
If true, the resource will always produce a “plan” and on “apply” it will re-grant defined privileges. It is
|
|
589
|
-
supposed to be used only in “grant privileges on all X’s in database / schema Y” or “grant all privileges to
|
|
590
|
-
X” scenarios to make sure that every new object in a given database / schema is granted by the account role and every
|
|
591
|
-
new privilege is granted to the database role. Important note: this flag is not compliant with the Terraform assumptions
|
|
592
|
-
of the config being eventually convergent (producing an empty plan).
|
|
593
|
-
"""
|
|
594
558
|
return pulumi.get(self, "always_apply")
|
|
595
559
|
|
|
596
560
|
@property
|
|
@@ -637,7 +601,7 @@ class GrantPrivilegesToAccountRole(pulumi.CustomResource):
|
|
|
637
601
|
@pulumi.getter
|
|
638
602
|
def privileges(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
639
603
|
"""
|
|
640
|
-
The privileges to grant on the account role.
|
|
604
|
+
The privileges to grant on the account role. This field is case-sensitive; use only upper-case privileges.
|
|
641
605
|
"""
|
|
642
606
|
return pulumi.get(self, "privileges")
|
|
643
607
|
|